X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 12/Aug 07:32

New Widespread Extension Trojan Malware Campaign

The malware attack flow involves luring users with fake websites imitating popular downloads, then executing PowerShell scripts to download and install malicious extensions that steal private data and control browser settings. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

LummaC2 Stealer and Malicious Chrome Extension Wreak Havoc

itsecuritynews.info - 09/Sep 11:02

This attack begins with victims unknowingly downloading a malicious ZIP archive containing an installer file that sideloads a malicious DLL. This DLL...

Sorry! Image not available at this time

LummaC2 Infostealer Resurfaces with Obfuscated PowerShell Tactics

itsecuritynews.info - 30/Aug 10:02

The latest variant employs obfuscated PowerShell commands to download and execute malicious payloads, utilizing Windows binaries like Mshta.exe and...

Sorry! Image not available at this time

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

itsecuritynews.info - 30/Aug 11:02

Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself as...

Sorry! Image not available at this time

Rocinante: The Trojan Horse That Wanted to Fly

itsecuritynews.info - 31/Aug 08:32

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to...

Sorry! Image not available at this time

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

itsecuritynews.info - 10/Sep 10:32

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware that utilized...

Sorry! Image not available at this time

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

itsecuritynews.info - 10/Sep 10:32

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware that utilized...